Publications

Export 1435 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Kurc T, Catalyurek U, Zhang X, Saltz J, Martino R, Wheeler M, Peszyńska M, Sussman A, Hansen C, Sen M et al..  2005.  A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. Concurrency and Computation: Practice and Experience. 17(11):1441-1467.
Khuller S, Matias Y.  1995.  A simple randomized sieve algorithm for the closest-pair problem. Information and Computation. 118(1):34-37.
Boneh D, Freeman D, Katz J, Waters B.  2009.  Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.
Nau DS, Au TC, Ilghami O, Kuter U, Murdock JW, Wu D, Yaman F.  2003.  SHOP2: An HTN planning system. J. Artif. Intell. Res. (JAIR). 20:379-404.
Kumar J, Chen F, Doermann D.  2012.  Sharpness Estimation for Document and Scene Images. International Conference on Pattern Recognition (ICPR 2012). :3292-3295.
Kotidis1⋆ Y, Sismanis Y, Roussopoulos N.  2001.  Shared index scans for data warehouses. Data Warehousing and Knowledge Discovery. :307-316.
Kumar J, Prasad R, Cao H, Abd-Almageed W, Doermann D, Natarajan P.  2011.  Shape Codebook based Handwritten and Machine Printed Text Zone Extraction. Document Recognition and Retrieval. :7874:1-8-7874:1-8.
Alam M, Chowdhury WB, Bhuiyan NA, Islam A, Hasan NA, Nair BG, Watanabe H, Siddique AK, Huq A, Sack BR et al..  2009.  Serogroup, Virulence, and Genetic Traits of Vibrio Parahaemolyticus in the Estuarine Ecosystem of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(19):6268-6274.
Kanagal B, Li J, Deshpande A.  2011.  Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. Proceedings of the 2011 international conference on Management of data. :841-852.
Kolda TG, O'Leary DP.  1998.  A semidiscrete matrix decomposition for latent semantic indexing information retrieval. ACM Trans. Inf. Syst.. 16(4):322-346.
Chazelle B, Kingsford C, Singh M.  2004.  A semidefinite programming approach to side chain positioning with new rounding strategies. INFORMS Journal on Computing. 16(4):380-392.
Getoor L, Taskar B, Koller D.  2001.  Selectivity estimation using probabilistic models. ACM SIGMOD Record. 30(2):461-472.
Chalfoun J, Kociolek M, Dima A, Halter M, Cardone A, Peskin A, Bajcsy P, Brady M.  2013.  Segmenting time-lapse phase contrast images of adjacent NIH 3T3 cells.. Journal of microscopy. 249(1):41-52.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Cardone A, Chalfoun J, Peskin A, Bajcsy P, Kociolek M, Bhadriraju K, Brady M.  2015.  Segmentation and sub-cellular feature-based analysis of microscopy images. BioImage Informatics Conference .
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A.  2005.  Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.

Pages